CN107852652A - The migration session between unauthorized data network and cellular network - Google Patents

The migration session between unauthorized data network and cellular network Download PDF

Info

Publication number
CN107852652A
CN107852652A CN201680044686.1A CN201680044686A CN107852652A CN 107852652 A CN107852652 A CN 107852652A CN 201680044686 A CN201680044686 A CN 201680044686A CN 107852652 A CN107852652 A CN 107852652A
Authority
CN
China
Prior art keywords
network
data
computing device
unauthorized
cellular network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201680044686.1A
Other languages
Chinese (zh)
Inventor
铭山·郭
W·阿卜杜勒舍希德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
T Mobile USA Inc
Original Assignee
T Mobile USA Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by T Mobile USA Inc filed Critical T Mobile USA Inc
Publication of CN107852652A publication Critical patent/CN107852652A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/542Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • H04W36/0038Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • H04W36/144Reselecting a network or an air interface over a different radio air interface technology
    • H04W36/1446Reselecting a network or an air interface over a different radio air interface technology wherein at least one of the networks is unlicensed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Abstract

Session switches between unauthorized data network and cellular network.Voice conversation and/or video session can carry out seamless migration between cellular network and unauthorized data network (for example, Wi Fi) with the transit time (for example, less than several seconds) of very little.The switching can occur from unauthorized data network to cellular network or from cellular network to unauthorized data network.During migrating between networks, the log-on data of cache is accessed, with the certification of speed-up computation device switching network.In some configurations, user can specify the preference for being changed between unauthorized data network and cellular network.For example, user can specify the preference that cellular network is used using Wi Fi networks before cellular network or before using Wi Fi networks.

Description

The migration session between unauthorized data network and cellular network
The cross reference of related application
The U. S utility patent Shen for the sequence No.14/814,953 that patent application claims were submitted on July 31st, 2015 Priority please.During sequence No.14/814,953 application is fully incorporated herein by reference.
Background technology
Computing device (such as radio telephone) can terminate (example in both unauthorized data network and cellular network Such as, receive or initiate) call.For example, when computing device is connected to Wi-Fi network, can be carried out in Wi-Fi network Calling.When computing device is not connected to Wi-Fi network, calling is likely to be positioned on cellular network.However, in different nets Calling is migrated between network may cause speech quality poor.
Brief description of the drawings
Detailed description has been described with reference to the drawings.In accompanying drawing, the leftmost one or more numerals of reference represent accompanying drawing Mark the accompanying drawing occurred first.Make similar or like project is presented with like reference characters in different accompanying drawings.
Fig. 1 is to show the Illustrative environment for the migration session between unauthorized data network and cellular network Block diagram.
The block diagram for showing system of some implementations according to Fig. 2, the system include being used to migrate between networks The calling customer terminal application program of communication.
The flow chart of the example process of some implementations according to Fig. 3, the process include communicating from unauthorized Switching of the data network to cellular network.
The flow chart of the example process of some implementations according to Fig. 4, the process include communicating from unauthorized Data network 106 arrives the switching of cellular network.
Embodiment
Described herein is to be used to migrate between data network and cellular network at unauthorized (unlicensed) (transition) technology and system of session (conversation).Using technology described herein, voice and/or video Session can between cellular network and unauthorized data network (for example, Wi-Fi) with very short transit time (for example, Less than several seconds) carry out seamless migration.
Can be with from unauthorized data network to cellular network or from cellular network to unauthorized data network Switch (handover).In some configurations, user can be specified in unauthorized data network and Cellular Networks The preference of (switch) is changed between network.For example, user can specify before cellular network using Wi-Fi network preference or Person uses the preference of cellular network before using Wi-Fi network.In other cases, user can be specified using only with utilization A type of network (for example, honeycomb or data).
In some instances, the migration between cellular network and unauthorized data network occurred in the existing session phase Between.For example, user can be in evolved UMTS land radio access web (Evolved Universal Mobile Telecommunications System Terrestrial Radio Access Network, EUTRAN) or Start session on the cellular network of some other types, and accessed in ession for telecommunication seamless migration to unauthorized Wi-Fi Network.In other examples, session may begin at unauthorized data network and move to cellular network.
According to some configurations, the signal intensity based on data network, unauthorized data network is moved to or is connected to. For example, when the signal strength indicator (RSSI) of received Wi-Fi network is higher than -75dBm (or some other values), can To initiate the migration to Wi-Fi network.RSSI is the power level that access point of the computing device just out of data network receives Measured value.Similarly, when the signal strength indicator (RSSI) of received Wi-Fi network is less than some particular value (example Such as, -85dBm, -75dBm or some other values) when, existing session can move to honeybee from unauthorized data network Nest network.
In some instances, subscriber endpoints (UE) (for example, mobile phone) are initiated when to migrate between the different networks.Open Begin, the computing device that request is switched to heterogeneous networks can be recognized by the wireless service provider associated with computing device Card.Authentication calculations device can assist to prevent the computing device of unauthorized access the network that is attached to wireless service provider or Service.For the time that the migration improved between network is spent, the log-on data of cache is accessed to accelerate to fill to calculating Put the certification of switching network.For example, can be obtained from the cache of cellular network it is previously having been obtained from computing device and/or The log-on message used in the earlier registration of computing device.So, can be quickly compared to traditional registration and authentication mechanism Perform certification.After being certified, session (session) is established in computing device request on the network being just migrated to, and Disconnected with current network.For example, if session is using unauthorized number using cellular network, computing device request Start communication session according to network, and terminate the communication session on wireless network.Break in request with the network being being currently used During opening the time between connection and actual switch-off connection, communication path is established in new network.Establishing new communication lines After footpath, the switching from current network to new network is performed.On Fig. 1-4, more details are provided below.
Fig. 1 is to show the Illustrative environment for the migration session between unauthorized data network and cellular network 100 block diagram.Environment 100 can include cellular network 102, and it is operated by wireless service provider.Cellular network 102 can be Universal Terrestrial Radio Access Network network (UTRAN), evolution UTRAN networks (E-UTRAN) (for example, Long Term Evolution (LTE)), the whole world are moved The cellular network 102 of dynamic communication system (GSM) EDGE Radio Access Networks (GERAN) or some other types.Generally, environment 100 can provide IP multimedia subsystem (IMS) 104, and it supports to take by the communication of Session initiation Protocol (SIP) infrastructure Business.As illustrated, environment 100 includes unauthorized data network 106 (for example, Wi-Fi).Environment 100 is in simplified form Show, and more components can be included.
As shown in figure 1, environment 100 includes UE (such as utilizing the computing device 108 of application program 110), gateway (S- GW 112), mobility management entity (MME 114), home subscriber servers (HSS116), packet gateway (P-GW 118), recognize Card, authorization and accounting component (AAA 124), such as ePDG122 etc gateway and access point 126.Although it is not shown, More multicompartment can be included in environment 100.For example, environment 100 can include eNodeB, Multimedia resource function controller (MRFC) (MRFC), Multimedia resource function processor (MRFP) (MRFP), proxy CSCF (P-CSCF), inquiry CSCF (I-CSCF) etc..
S-GW 112 can serve as the terminal of the packet data interface towards cellular network 102 (for example, E-UTRAN).Come The packet of cellular autofluorescence network 102 is route by S-GW 112.S-GW 112 serves as the local mobile anchor of computing device 108.
MME 114 can provide function for subscriber and session management.MME 114 can be contained in bearing activation and it goes Activate in program, and can be responsible for the certification users of HS 116.MME 114 can also be interacted with HSS to determine computing device 108 current location, and communicated with S-GW 112 with the communication session that please be look for novelty.
HSS 116 stores and updated the database for including user subscription information, and user subscription information includes following item, example Such as, user's identification and addressing (for example, IMSI (International Mobile Subscriber identity) and MSISDN (mobile subscriber ISDN number)), user Profile information (such as subscribing to data).HSS 116 can be additionally configured to perform other operations.
P-GW 118 serves as cellular network 102 and other packet data network (for example, unauthorized data network 106 Or the IMS 104 based on SIP) between interface.AAA 12 provides function in terms of supporting user and cellular network service Calculate certification, the authorization and accounting of device.EPDG 122 is provided to computing device 108 by unauthorized data network 106 and connect Access point, to access the service provided by wireless service provider.Access point 126 allows wireless device (for example, computing device 108) It is connected to unauthorized data network 106.
Apps server 126 handles and explains message, such as sip message.In some configurations, it is one or more Individual apps server 106 is configured to one or more application programs and provides support, for example, application program 110. Although apps server 126 is illustrated in IMS 104, other one or more computing devices can be located at IMS 104 outside.For example, either some other servers or device can be via one or more for apps server Individual external packet-switched (for example, internet) is connected to IMS 104.
According to some configurations, calling customer terminal application program (for example, application program 110) on computing device 108 can be with Data are established via P-GW 118 with IMS 104 by data connection to communicate.In some instances, application program 110 can be Calling appl., its request is conversed using cellular network 102 and/or unauthorized data network 106, (for example, language Sound and/or video).Application program 110 may be configured to determine that when from cellular network 102 move to unauthorized data network Network 106 and/or when from unauthorized data network 106 move to cellular network 102.It is for example, such as hereinafter more detailed Ground discussion, computing device 108 can be based on user preference and the availability of unauthorized data network and cellular network To determine when to migrate between networks.
According to some configurations, the application program 110 on computing device 108 can be via unauthorized data network 106 It is connected to apps server 126 or some other components.In this case, application program 110 can access via Wi-Fi Put 126 and be connected to network 106.Therefore, the data traffic from application program 110 can be routed to using journey by gateway 122 Sequence server 106.In other configurations, application program 110 can be connected to apps server via cellular network 102 126 or some other components.
In some cases, before computing device 108 is connected to cellular network 102 and/or provide by with Cellular Networks Before the service that the associated wireless service provider of network 102 provides, computing device 108 is certified.For example, application program service Device 106 can be authorized to use the service from IMS 104 with authentication calculations device 108.According to some configurations, in order to improve in honeybee The spent time is migrated between nest network and unauthorized data network, accesses the log-on data of cache with accelerometer Calculate the certification of device switching network.For example, can be obtained from the cache of cellular network previously obtained from computing device and/ Or the log-on message used in the earlier registration of computing device.Cache can be with apps server 126, HSS 116th, AAA 124, MME 114, gateway 122 or some other devices or component associated with cellular network are associated.In this way, Log-on message obtained during the earlier registration of computing device or generation can be utilized, rather than must be spent from Cellular Networks Computing device and other assemblies in network obtain the time needed for log-on message.In some instances, it is sharp in computing device With a period of time (such as 5 minutes, 10 minutes) during time of the service associated with cellular network and afterwards, registration letter Breath is cached.
Computing device 108 and other users end points computing device can include being used to utilize gateway 122 (for example, ePDG) The component and/or function of ipsec tunnel are established on unauthorized data network 106.According to some examples, gateway 116 connects P-GW 118 is connected to, it is connected to cellular network 102.EPDG can support different IMS services, such as, but not limited to LTE Upper voice (VoLTE), Wi-Fi callings (WFC), video call (VC), rich communication suite (RCS) etc..
Such as Brief Discussion, computing device 108 can ask to initiate to communicate.According to some examples, the request can be hair Play the request of the electronic communication (for example, SMS or MMS) of audio call, video call or some other types.In some configurations In, network availability and user preference determine whether to establish in unauthorized data network 106 or cellular network 102 Communication.For example, when user has specified that the preference called using Wi-Fi, if unauthorized data network 106 can not With (for example, the signal intensity of data network does not have data network less than the threshold value specified or in the range of), then honeybee can be used Nest network 102 establishes communication.In other examples, when the signal intensity of network is higher than the threshold value specified and user has caused Can be when data network be communicated, then communication can be established initially on unauthorized data network 106.
For task of explanation, it is assumed that initially establish voice communication using cellular network 102.As discussed above, communicate It can be carried out on any kind of cellular network.In some instances, called in EUTRAN (for example, LTE).In voice Sometime, unauthorized data network 106 can be transferred to communication period by being determined communication.For example, calculate dress Put 108 can detect for unauthorized data network 106 RSSI instruction be connected to unauthorized network 106 for Voice communication is acceptable.In some instances, when RSSI is -75dBm or is more preferable, application program 110 determines will communication Unauthorized data network 106 is moved to from cellular network 102.In other examples, different signal intensities can be utilized Threshold value.
, can be with after it is determined that moving to different network (being unauthorized data network 106 in this case) Authentication calculations device 108.It is, for example, possible to use AAA 124 and HSS 116 carry out authentication calculations device 108.As discussed above, Allow computing device 108 move to heterogeneous networks before authentication calculations device 108 can aid in prevent unauthorized access by The service that wireless service provider provides.Also as discussed above, calculating can be improved using the log-on data of cache The speed of registration and the certification of device 108.
In some configurations, the request of computing device 108 moves to unauthorized wireless network 106.According to some examples, EPDG 122 is issued to P-GW 118 and is created session request, to ask the communication path on unauthorized data network 106.Wound Build session request and start switching from cellular network 102 to unauthorized data network 106.
In response to receiving establishment session request, P-GW 118 sends " deleting bearing request information, S- to S-GW 112 GW 112 forwards the message to MME 114, to start to disintegrate the communication path on cellular network.Receive and delete in P-GW 118 After being responded except carrying, calling can be re-routed to by P-GW 118 using automatic alternating path by (AAR) from cellular network 102 Unauthorized data network 106.The certification provided by AAA 122, authorization and accounting function can be used to be filled come authentication calculations Put 108.In some instances, as discussed above, the log-on data associated with computing device 108 can be in log-on data 120 internally cached a period of time of cache.As long as for example, a period of time (example of computing device 108 and hereafter Such as, a few minutes) service provided by wireless service provider is provided, it is possible to cache log-on data cache 120.This Sample, compared with asking the authentication information of the component in environment 100, the certification of computing device 108 can be faster.Match somebody with somebody at some In putting, when computing device 108 is first connected to cellular network 102 and/or is otherwise connected to IMS 104, number is registered According to being cached in log-on data cache 120.
After AAA responses are received from MME 114, P-GW 118 is sent to ePDG 122 by conversational response is created, and And ipsec tunnel is established in unauthorized data network 106, and voice communication is switched to unauthorized data network Network 106.Voice communication is moved into cellular network 102 (referring to figure from unauthorized network 106 using similar flow 4)。
Fig. 2 is the block diagram for showing system 200 according to some implementations, and the system includes being used to migrate between networks The calling customer terminal application program of communication.System 200 includes being coupled to the computing device 202 of server 204 via network 206. Computing device 202 can similarly be configured with computing device 108.Similarly, network 256 can be identical with network 102 Network, and network 258 can be unauthorized data network 106 same as shown in Figure 1.
Computing device 202 can be that radio telephone, tablet personal computer, laptop computer, wrist-watch or other kinds of calculate fill Put.Computing device can include one or more processors 208 and computer-readable medium, and such as memory is (for example, random Access memory (RAM), solid-state drive (SSD) etc.), disk drive (such as hard disk drive based on disc), it is another The computer-readable medium of type or its any combinations.
Computer-readable medium 210 can be used for store instruction to perform various functions and be used for data storage.For example, meter Calculation machine computer-readable recording medium 210 can include instruction 214, calling customer terminal 216, local dialing device 218, position determination module 220, when Preceding operator scheme 222 and overlay file 224.Certainly, computer-readable medium 210 can also include it is other kinds of instruction and Data, operating system, device driver etc..Calling customer terminal 216 can allow the user to be communicated (for example, language Sound calling, SMS or MMS) and/or determine when existing communication from a network migration to another network.For example, phone is objective Family end 216 can determine to unauthorized data network 258 connection have enough quality come handle audio call and/or Video call.
Local dialing device 218 (also referred to as mobile dial device) can be such application program:It makes it possible for meeting Initiation protocol (SIP) signaling is talked about to initiate to call via voice over internet protocol (VoIP).Position determination module 220 can determine to count Calculate the current location of device 202.For example, position determination module 220 can determine present bit using global positioning system (GPS) Put.The current location determined by position determination module 220 can determine pattern 222.For example, if computing device 202 is current Position is provided in the geographic area covered in the operator associated with the device number 226 of computing device 202, then pattern 222 It can be configured to operator's pattern.If the current location of computing device 202 does not provide the geographic area of covering in operator In (for example, the position that the radio telephone associated with device number 226 can be roamed normally), then pattern 222 can be set to Cross top (Over-The-Top, OTT) pattern.
Display device 212 can be separated with computing device 202 or integrated with computing device 202 (for example, such as Fig. 2 It is shown).Display device 212 can show the various information associated with initiating calling.Except as 10 traditional phone numbers Outside code, device number 226 is also used as Uniform Resource Identifier (URI), for example, being used as Internet protocol (IP) multimedia Private identity (IMPI), global identity is distributed by the unique permanent of home network operator (for example, operator) distribution.
Destination number 228 can be the number of another user communicate with or calling.In other words, destination number Code 228 is the position that calling is routed to.
Server 204 can include one or more processors 244 and one or more computer-readable mediums 246.Computer-readable medium 246 can be used for store instruction 248, one or more databases 250, the and of routing module 252 Authentication module 254.Instruction 248 can be performed by processor 244 to perform various functions described here.Database 250 can be with Database including storage information, such as which addition number are associated with device number etc..Routing module 252 can be used for setting Put, route and migrate the calling from computing device 202.
Authentication module 254 can perform various types of certifications, including determine whether user is authorized to and be connected to network 206.Network 206 can include one or more networks, such as cellular network 256 and unauthorized data network 258.Honeybee Nest network 256 can use such as global mobile system (GSM), CDMA (CDMA), universal Mobile Telephone Service (UMTS) Deng technology come provide wide-area wireless covering.Although between cellular network 256 and computing device (for example, computing device 202) Communication can be performed using wide area wireless network, but cellular network 256 can include other technologies, such as wired (common Plain old telephone service (POTS) circuit), optics is (for example, Synchronous Optical Network work (SONET) technology etc..
Unauthorized data network 258 can include being used to transmitting and receiving the various types of of data (for example, packet) The network of type, the network including the use of following technology:Such as (" Wi- of Institute of Electrical and Electric Engineers (IEEE) 802.11 Fi "), IEEE 8021.15.1 (" bluetooth "), asynchronous transfer mode (ATM), Internet protocol (IP) etc..Term " data network Network " refers to transmission and the packet received in unauthorized data network 258.Use VoIP or other technologies and data Flow, packet can be used for carry voice flux.
In some cases, such as upon power-up or with periodic intervals, computing device 202 can use position true Pattern 222 is arranged to operator's pattern (for example, present bit by cover half block 220 to determine the current location of computing device 202 When putting within the coverage of the operator associated with device number 226) or OTT patterns (for example, current location with dress When putting outside the coverage of the associated operator of number 226).
Calling customer terminal 216 can send registration request 260 so that computing device 202 to be registered to the net of local operator Network.For example, registration request 260 can be sent to server 204 by calling customer terminal 216, by computing device 202 be registered to The associated local operator of network 206.Registration request 260 can be received by server 204, and server 204 can be configured As service call conversation control function (" S-CSCF ") server or as internet protocol multi-media sub-system (" IMS ") Some other components of a part.Registration request can include specifying what is registered to one or more apps servers The feature tag of different characteristic.For example, feature tag can include feature, such as, but not limited to mediaphone (" MMTEL ") Feature, short message session initiation protocol (" SMSIP ") feature, Futong's telecommunications services (" RCS ") feature etc..Registration request 260 can To indicate that computing device is (for example, using data network with honeycomb mode (for example, using cellular network 256) or OTT patterns 258) register and specify the preference using a type of network or another type network.In honeycomb mode, dress is calculated Putting 202 can use cellular network to initiate to call and terminate calling.In OTT patterns, computing device 202 can be used without being permitted Can data network 258 (for example, via VoIP) initiate to call and terminate calling.
When user it is expected using computing device 202 initiate communication when, calling customer terminal 216 can prompt user selection (or Person's entrance) destination number 228 (for example, destination of calling).Communication request 262 can be sent to clothes by computing device 202 Business device 204, communication request 262 include institute's assigned unit number 226, initiator device number 230 (if different from what is distributed Device number 226) and destination number 228.Communication request 262 notifies server 204 to send communication from computing device 202.
After communication request 262 is received, communication request 262, and determination and device number can be certified in authentication module 254 Whether associated account, which is authorized to, is initiated calling.For example, authentication module 254 can be examined from one or more databases 250 Rope accounts information, whether it is authorized to the account for determining associated with computing device 202.In some instances, accounts information or Other log-on datas can be stored in cache, all log-on data caches 120 as shown in Figure 1 etc..When with dress Put the associated account of number 226 it is uncommitted when, server 204 can send refusal communication request 262 to computing device 202 Message.When the account associated with device number 226 be authorized to initiate calling when, server 204 can to destination number The associated one or more computing devices of code 228 are communicated.Server 204 can also be to apps server 108 The communication information as described above is provided, apps server 108 is assigned to handle the request to initiator device number 230.
In Fig. 3 and Fig. 4 flow chart, each frame represent can with hardware, software or its combination come realize one or More operations.Under the background of software, these frames represent computer executable instructions, and it is by one or more processors During execution, make the operation described in computing device.Generally, computer executable instructions include performing specific function or realized specific The routine of abstract data type, program, object, module, component, data structure etc..The order of described block be not intended as by It is construed to limit, and in any order and/or any amount of described operation can be combined in parallel to realize these Process.For discussion purposes, as described above, reference system 100,200 describes process 300 and 400, but other models, Framework, system and environment can realize these processes.
Fig. 3 is to include communication from unauthorized data network 106 to cellular network 102 according to some implementations The flow chart of the example process 300 of switching.Process 300 can be performed by one or more computing devices, such as on Fig. 1 With the computing device of 2 descriptions.
At 302, request is received from computing device to initiate the communication from originating number to destination number.As above begged for Opinion, the request can initiate audio call, video call or some other kinds of electronic communications (for example, SMS or MMS) Request.Also as discussed above, can be communicated on unauthorized data network 106 or cellular network 102.One In a little configurations, network availability and user preference determine whether that foundation is logical on data network 106 or cellular network 102 Letter.For example, if unauthorized data network 106 is unavailable (for example, the signal intensity of data network is less than the threshold value specified Or there is no data network in the range of), then communication can be established over a cellular network.In other examples, when the signal of network , then can be in data network when intensity has made it possible to be communicated over data networks higher than the threshold value and user specified It is upper to establish communication.For purposes of explanation, Fig. 3 shows moving from cellular network 102 to unauthorized data network 106 Move, and Fig. 4 shows the migration from unauthorized data network 106 to cellular network 102.
At 304, communication is initially established on cellular network 102.As discussed above, communication can be in many differences Carried out on the cellular network of type.In some instances, called on an LTE network.For example, it can be carried out on EUTRAN Calling.
At 306, data network (for example, Wi-Fi) is determined during cellular network communication is used and can be used for communicating. As discussed above, unauthorized data network 106 can be detected by the computing device 108 for initiating communication.Show at some In example, determine the signal intensity of unauthorized data network 106 for voice by the application program 110 on computing device 108 Communication is acceptable.For example, application program 110 can enter signal intensity and threshold value (such as -75dbm or some other values) Row compares, to determine that data network will support voice and/or video communication.
At 308, computing device 108 can be certified.As discussed above, gateway 122 can be with one of network 102 Or more component interaction with authentication calculations device 108.For example, ePDG (such as gateway 122) can be with AAA 124 and/or HSS 116 interactions are with authentication calculations device 106.In some instances, can be used for the data of authentication device 108 can be stored in height In speed caching, such as in log-on data cache 120.When computing device 108 is uncommitted, another network is moved to Request can be rejected.
At 310, established on unauthorized data network 106 request of communication path.As discussed above, EPDG 122 can be issued to P-GW 118 and be created conversation request message.Before the communication path in cellular network 102 is terminated, Establishment session request starts the switching from cellular network 102 to unauthorized data network 106.
At 312, disintegrating for communication path is initiated.In response to receiving establishment session request, P-GW 118 can pass through Deleting bearing request message is sent to S-GW 116 and deactivates communication path.Deleting bearing can be asked to send by S-GW 116 To MME 114.
At 314, the communication path established on data network.As discussed above, after deleting bearing, P-GW 118 The communication path (for example, IPsec tunnels) in unauthorized data network 106 can be activated.In some instances, P-GW Calling is re-routed to unauthorized data network 106 by 118 using automatic alternating path by (AAR).
At 316, communication is switched to data network.As discussed above, P-GW 118 can will create conversational response hair EPDG 122 is sent to, and communicates and is migrated to unauthorized data network 106.
Fig. 4 is to include communication from unauthorized data network 106 to cellular network 102 according to some implementations The flow chart of the example process 400 of switching.Process 400 can be performed by one or more computing devices, such as on Fig. 1 With the computing device described by 2.
At 402, using the unauthorized communication period of data network 106 determine be transformed into cellular network (for example, EUTRAN).As discussed above, the company of unauthorized data network 106 can be determined by initiating the computing device 108 of communication Connect to have lost or connected and no longer there is the acceptable quality for being used for handling voice and/or video communication.In some instances, Signal intensity is determined by computing device 108 and is less than -85dBm or some other values.
At 404, computing device 108 can issue the request for being attached to cellular network 102.In some instances, calculate Device 108 issues attachment request to MME 114.Attachment request can trigger one or more processes and be used to calculate dress to establish Put 108 special EPS carryings.For example, the process can include authentication calculations device 108A, the position (example of computing device is determined Such as, using HSS), and issued to S-GW 112 and create session request.S-GW 112 can will create session request and be transmitted to P- GW 118。
At 406, it can start to terminate using the communication session of unauthorized data network 106.For example, P-GW 118 Deleting bearing request can be issued to ePDG 122, and session termination request is issued to AAA 124.
At 408, the communication path established on cellular network 102.As discussed above, after deleting bearing, P-GW 118 can activate the communication path in cellular network 102.In some instances, P-GW118 is transmitted to S-GW 112 and is created session Response, the response are provided to MME 114.
At 410, in response to receiving establishment conversational response, MME 114 (for example, via EnodeB) and computing device 108 are communicated, to reconfigure communication and communication is attached into cellular network 102.In some instances, MME 114 is to S- The transmission modification carryings of GW 112 are asked to complete to switch.At 412, communication is switched to the cellular network that communication can continue 102。
Above-mentioned various technologies are assumed to be in given example in computer executable instructions or software (such as program mould Block) general context in realize, the computer executable instructions or software be stored in computer-readable storage and by One or more computing devices of one or more computers or other equipment (all those equipment as illustrated in the drawing). Generally, program module includes routine, program, object, component, data structure etc., and defines for performing particular task or realization The operation logic of particular abstract data type.
Described function can be realized using other architectural frameworks, and is intended to fall within the scope of the present disclosure.This Outside, although defining specific responsibility distribution above for the purpose of discussion, as the case may be, various functions and responsibility can Distribute and distinguish by different way.
Similarly, software can be and above-mentioned specific soft in a variety of ways and using different means storages and distribution Part, which stores and performed configuration, to be changed in a number of different ways.Therefore, realizing the software of above-mentioned technology can be distributed in respectively On the computer-readable medium of type, and it is not limited to the form of memory specifically described.
In addition, although describing theme with the language acted specific to architectural feature and/or method, but should manage Solution, the theme limited in the following claims are not necessarily limited to described specific features or action.On the contrary, specific feature It is disclosed as realizing the exemplary form of claim with action.

Claims (20)

1. a kind of computer implemented method by being configured with one or more computing devices of specific instruction, the calculating The method that machine is realized includes:
Communication session is established over a cellular network for computing device, wherein the communication session includes speech data;
It is determined that the computing device is connected to unauthorized data network;
Initiate the connection of the unauthorized data network;
In response to initiating the connection to the unauthorized data network,
Terminate the communication session on the cellular network;And
Using computing device described in the data authentication of cache, the data of the cache include existing with the computing device The log-on data that earlier registration on the cellular network is associated;And
The communication session is switched to the unauthorized data network.
2. computer implemented method according to claim 1, wherein determine by the computing device be connected to it is described not Licensed network includes:Determine that the signal intensity of Wi-Fi network exceedes threshold value.
3. computer implemented method according to claim 1, wherein the cellular network is Long Term Evolution (LTE) honeycomb Network, the unauthorized network is Wi-Fi network, and the computing device is mobile phone.
4. computer implemented method according to claim 1, in addition to:Initiating to arrive the unauthorized data network Computing device described in certification before the connection of network.
5. computer implemented method according to claim 1, wherein determine by the computing device be connected to it is described not Licensed data network includes:Access user preference with determine with it is described unauthorized so that the computing device to be connected to The first condition of the time correlation connection of data network.
6. computer implemented method according to claim 4, wherein the communication session is switched to described without being permitted Can data network spend be less than two seconds.
7. computer implemented method according to claim 1, wherein computing device described in certification include:By the registration Data high-speed is buffered in the cache of the cellular network, and is connected to the unauthorized net in the computing device The log-on data is stored in the cache in a period of time after network.
8. a kind of system, including:
One or more processors;And
One or more memories of store instruction, the instruction are held when by one or more computing device Action is made, and the action includes:
The use of first network is that client computing devices establish communication session, the first network is for cellular network or without approval Data network;
Received from the client computing devices and initiate the communication session from the first network to the switching of the second network Request, wherein the second network described in when the first network is the cellular network is the unauthorized data network, And the second network described in when the first network is the unauthorized data network is the cellular network;
Initiate the connection of second network;
Using the data of cache come client computing devices described in certification, the data of the cache and the client Earlier registration of the computing device on the cellular network is associated;
Terminate the communication session on the first network;And
The communication session is switched to second network from the first network.
9. system according to claim 8, wherein initiating the communication session from the first network to second net The request of the switching of network is based at least partially on the signal intensity of the unauthorized data network.
10. system according to claim 8, wherein the cellular network is Long Term Evolution (LTE) cellular network, Yi Jisuo It is Wi-Fi network to state unauthorized network.
11. system according to claim 8, wherein the action also includes:Initiating to described in second network Before connection, from the data of cache described in the cellular cache access.
12. system according to claim 8, wherein being connected to the first network and institute in the client computing devices During the time for stating the second network, the data of the cache are stored in the cache associated with the cellular network It is interior.
13. system according to claim 8, wherein the action also includes:Access and specify and the cellular network and institute State the user preference of the associated connection priority of unauthorized data network.
14. system according to claim 8, wherein the client computing devices determine to initiate the communication session from institute State the switching of the first network to second network.
15. a kind of non-transitory computer-readable medium for storing computer executable instructions, the computer executable instructions When executed act one or more computing devices of computing device, the action includes:
The use of first network is that client computing devices establish communication session, the first network is for cellular network or without approval Data network;
The connection to the second network is initiated, wherein the second network described in when the first network is the cellular network is described Unauthorized data network, and the second network described in when the first network is the unauthorized data network is institute State cellular network;
Using the data of cache come client computing devices described in certification, the data of the cache and the client Earlier registration of the computing device on the cellular network is associated;
Terminate the communication session on the first network;And
The communication session is switched to second network from the first network.
16. non-transitory computer-readable medium according to claim 15, wherein the action also includes:From the visitor Family end computing device, which receives, initiates the communication session from the first network to the request of the switching of second network.
17. non-transitory computer-readable medium according to claim 16, wherein initiating the request of the switching It is based at least partially on the signal intensity of the unauthorized data network.
18. non-transitory computer-readable medium according to claim 15, wherein the cellular network is Long Term Evolution (LTE) cellular network, and the unauthorized network is Wi-Fi network.
19. non-transitory computer-readable medium according to claim 15, wherein the action also includes:Initiating to arrive Before the connection of second network, the data of cache described in the cache access from the cellular network.
20. non-transitory computer-readable medium according to claim 15, wherein the action also includes:Access and specify The user preference of the connection priority associated with the cellular network and the unauthorized data network, to determine when Initiate the connection of second network.
CN201680044686.1A 2015-07-31 2016-07-15 The migration session between unauthorized data network and cellular network Pending CN107852652A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US14/814,953 US10051644B2 (en) 2015-07-31 2015-07-31 Transitioning a conversation between an unlicensed data network and a cellular network
US14/814,953 2015-07-31
PCT/US2016/042587 WO2017023519A1 (en) 2015-07-31 2016-07-15 Transitioning a conversation between an unlicensed data network and a cellular network

Publications (1)

Publication Number Publication Date
CN107852652A true CN107852652A (en) 2018-03-27

Family

ID=57883542

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201680044686.1A Pending CN107852652A (en) 2015-07-31 2016-07-15 The migration session between unauthorized data network and cellular network

Country Status (4)

Country Link
US (2) US10051644B2 (en)
EP (1) EP3314944A4 (en)
CN (1) CN107852652A (en)
WO (1) WO2017023519A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111669790A (en) * 2019-03-08 2020-09-15 中国移动通信有限公司研究院 Cell reselection or redirection method, device, network side equipment and terminal
CN112314033A (en) * 2018-05-03 2021-02-02 诺基亚通信公司 Selecting and managing network slices
CN114788313A (en) * 2019-10-16 2022-07-22 特鲁丰有限公司 On-demand network connection

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10051644B2 (en) 2015-07-31 2018-08-14 T-Mobile Usa, Inc. Transitioning a conversation between an unlicensed data network and a cellular network
US10567447B2 (en) * 2015-10-26 2020-02-18 Mediatek Inc. Apparatuses and methods for coordinating communication operations associated with a plurality of subscriber identity cards in a mobile communication device with a single wireless transceiver
US10212627B2 (en) * 2015-12-11 2019-02-19 Reliance Jio Infocomm Usa, Inc. Co-existence mechanism for downloadable voice application client
US11395216B2 (en) * 2018-10-31 2022-07-19 Comcast Cable Communications, Llc Voice-over-internet-protocol (VoIP) communications
US10694457B1 (en) 2019-02-21 2020-06-23 At&T Intellectual Property I, L.P. Volte roaming using general purpose packet data access

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070083470A1 (en) * 2005-10-12 2007-04-12 Cingular Wireless Ii, Llc Architecture that manages access between a mobile communications device and an IP network
US20070149195A1 (en) * 2005-12-27 2007-06-28 Samsung Electronics Co., Ltd. Apparatus and method for providing seamless handover
US20080119187A1 (en) * 2001-02-26 2008-05-22 Gallagher Michael D Apparatus for Supporting the Handover of a Telecommunication Session Between a Licensed Wireless System and an Unlicensed Wireless System
CN101730093A (en) * 2009-02-20 2010-06-09 中兴通讯股份有限公司 Safe switching method and system
US20110019639A1 (en) * 2009-05-22 2011-01-27 Jeyhan Karaoguz Enterprise Level Management in a Multi-Femtocell Network
WO2013106536A2 (en) * 2012-01-11 2013-07-18 Interdigital Patent Holdings, Inc. Method and apparatus for accelerated link setup
CN103392319A (en) * 2010-12-30 2013-11-13 交互数字专利控股公司 Authentication and secure channel setup for communication handoff scenarios
US20140286309A1 (en) * 2011-12-23 2014-09-25 Cellco Partnership (D/B/A Verizon Wireless) Handing over a user device from one technology to another
US20150208309A1 (en) * 2014-01-21 2015-07-23 Cisco Technology, Inc. System and method for seamless mobility in a network environment

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999067967A1 (en) 1998-06-23 1999-12-29 Siemens Aktiengesellschaft Method for controlling the handover of telecommunication connections between mobile parts and base stations in cellular telecommunications systems having wireless telecommunication
US20060052113A1 (en) * 2004-09-07 2006-03-09 Shai Ophir Roaming presence and context management
US7933598B1 (en) * 2005-03-14 2011-04-26 Kineto Wireless, Inc. Methods and apparatuses for effecting handover in integrated wireless systems
US20090061877A1 (en) * 2006-07-14 2009-03-05 Gallagher Michael D Generic Access to the Iu Interface
KR101503839B1 (en) 2007-07-13 2015-03-18 삼성전자주식회사 Apparatus and method for handover of multi-mode portable terminal
WO2009039318A1 (en) * 2007-09-18 2009-03-26 Kineto Wireless, Inc. Method and system for supporting large number of data paths in an integrated communication system
JPWO2010041440A1 (en) * 2008-10-08 2012-03-08 パナソニック株式会社 Interface switching system, mobile node, proxy node and mobility management node
CN101841876B (en) * 2009-03-20 2013-03-13 上海贝尔股份有限公司 Transfer method and device between unauthorized mobile access network and honeycomb communication network
US9374744B2 (en) * 2011-08-10 2016-06-21 Kt Corporation Apparatus and method for seamless handoff of a service between different types of networks
TWI477185B (en) * 2012-10-22 2015-03-11 Hon Hai Prec Ind Co Ltd Handover controlling system between home nodebs and handover controlling system method thereof
US9143995B2 (en) * 2013-02-22 2015-09-22 Cisco Technology, Inc. System and method for hand-in disambiguation using user equipment WiFi location in a network environment
US20140269611A1 (en) 2013-03-14 2014-09-18 T-Mobile Usa, Inc. Communication Handovers from Networks Using Unlicensed Spectrum to Circuit-Switched Networks
US9560185B2 (en) * 2014-03-19 2017-01-31 Microsoft Technology Licensing, Llc Hybrid telecommunications network connection indicator
US9456333B2 (en) * 2014-07-09 2016-09-27 Microsoft Technology Licensing, Llc Centralized routing in hybrid networks
US9661530B2 (en) * 2014-12-12 2017-05-23 Apple Inc. Data traffic bearer selection based on backhaul statistics
US20150326636A1 (en) * 2015-05-08 2015-11-12 Bandwidth.Com, Inc. Optimal use of multiple concurrent internet protocol (ip) data streams for voice communications
US10051644B2 (en) 2015-07-31 2018-08-14 T-Mobile Usa, Inc. Transitioning a conversation between an unlicensed data network and a cellular network

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080119187A1 (en) * 2001-02-26 2008-05-22 Gallagher Michael D Apparatus for Supporting the Handover of a Telecommunication Session Between a Licensed Wireless System and an Unlicensed Wireless System
US20070083470A1 (en) * 2005-10-12 2007-04-12 Cingular Wireless Ii, Llc Architecture that manages access between a mobile communications device and an IP network
US20070149195A1 (en) * 2005-12-27 2007-06-28 Samsung Electronics Co., Ltd. Apparatus and method for providing seamless handover
CN101730093A (en) * 2009-02-20 2010-06-09 中兴通讯股份有限公司 Safe switching method and system
US20110019639A1 (en) * 2009-05-22 2011-01-27 Jeyhan Karaoguz Enterprise Level Management in a Multi-Femtocell Network
CN103392319A (en) * 2010-12-30 2013-11-13 交互数字专利控股公司 Authentication and secure channel setup for communication handoff scenarios
US20140286309A1 (en) * 2011-12-23 2014-09-25 Cellco Partnership (D/B/A Verizon Wireless) Handing over a user device from one technology to another
WO2013106536A2 (en) * 2012-01-11 2013-07-18 Interdigital Patent Holdings, Inc. Method and apparatus for accelerated link setup
US20150208309A1 (en) * 2014-01-21 2015-07-23 Cisco Technology, Inc. System and method for seamless mobility in a network environment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112314033A (en) * 2018-05-03 2021-02-02 诺基亚通信公司 Selecting and managing network slices
CN111669790A (en) * 2019-03-08 2020-09-15 中国移动通信有限公司研究院 Cell reselection or redirection method, device, network side equipment and terminal
CN114788313A (en) * 2019-10-16 2022-07-22 特鲁丰有限公司 On-demand network connection

Also Published As

Publication number Publication date
EP3314944A4 (en) 2018-11-21
EP3314944A1 (en) 2018-05-02
US10506614B2 (en) 2019-12-10
US20170034744A1 (en) 2017-02-02
US20180324817A1 (en) 2018-11-08
WO2017023519A1 (en) 2017-02-09
US10051644B2 (en) 2018-08-14

Similar Documents

Publication Publication Date Title
CN107852652A (en) The migration session between unauthorized data network and cellular network
EP3318084B1 (en) Systems and methods for mobility management in a distributed software defined network packet core system
CN109391979B (en) Method, device and system for restoring P-CSCF (proxy-Call Session control function) fault
CN108476448B (en) Service processing method and IMS core network equipment
CN109729181A (en) A kind of method for accessing domain name and equipment
CN109548093B (en) Network switching method, device and system
CN102687582B (en) Switching delay is optimized
EP2661941B1 (en) Method of routing a session from a calling party in a serving communication network of the calling party to a called party
EP2974450B1 (en) Communication handovers from networks using unlicensed spectrum to circuit-switched networks
CN107925703A (en) Using temporary routing numbers audio call is originated from selected number
JP2013528993A (en) Terminal capability acquisition method and system using terminal, HSS, and core network element
WO2019219619A1 (en) Methods, system and nodes of optimized inactivity timer usage in 5gs
CN103619006B (en) Method and system for achieving voice call service
US9271116B1 (en) Location-based telephone calls over a wireless local area network (WLAN)
US10264619B2 (en) Local call service control function server selection
EP3469822B1 (en) Improved handling of ims services and emergency calls in a roaming scenario of a user equipment
US8224334B1 (en) Calling connection for mobile communication
CN103561441A (en) Dynamic strategy updating method and device based on timestamp
CN108260097B (en) Method for solving roaming charging error during eSRVCC switching and eMSC
CN103118407B (en) A kind of method and system for realizing reverse single-standby service continuity
CN101577674B (en) Method for user terminal to access to home network PDN and visit network PDN
Brnovic Trends in the evolution of voice services: A comprehensive survey
KR101638731B1 (en) Apparatus and Method for processing VoLTE Originating Call
KR100965005B1 (en) Apparatus and method for managing call session under IP based network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
AD01 Patent right deemed abandoned

Effective date of abandoning: 20210817